Unlock instant, AI-driven research and patent intelligence for your innovation.

A virtual machine security protection method and system based on big data and machine learning

A machine learning and security protection technology, applied in computer security devices, electrical digital data processing, instruments, etc., can solve problems such as inability to protect virtual machines, and achieve the effect of high recognition rate

Active Publication Date: 2019-01-22
电子科技大学成都学院
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a virtual machine security protection method and system based on big data and machine learning, which solves the technical problem that the current security protection system cannot effectively protect the virtual machine

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A virtual machine security protection method and system based on big data and machine learning

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment 1

[0085] A virtual machine security protection method based on big data and machine learning, comprising the following steps:

[0086] Step 1: Extract ordinary files and browser files in the NTFS file system from the virtual disk of the virtual machine;

[0087] Step 11: Obtain the virtual disk handle of the virtual machine and initialize the disk handle;

[0088] Step 12: Utilize the disk handle to obtain the initial sector in the NTFS file system and obtain the MTF file record table in the NTFS file system;

[0089] Step 13: traversing the file record numbers in the MTF file record table;

[0090] Step 14: Extracting common files and browser files by using the file record number.

[0091] The ordinary file acquisition method in the NTFS file system is: read the H30 attribute value of the file under the file record number, utilize the H30 attribute value to judge the type of the ordinary file, if the file is a small file, then in the H80 attribute value of the file If the fi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a virtual machine security protection method based on big data and machine learning, belonging to the field of security protection. The method includes: firstly, extracting a common file and a browser file in an NTFS file system from a virtual disk of the virtual machine, then identifying the malicious features in the normal file, comparing the identified malicious featureswith the features in the malicious file feature library, judging whether the file is a malicious file, cleaning if the file is a malicious file, otherwise extracting a web address in the browser file, judging whether the web address is a malicious web address by using a machine learning model, cleaning if the web address is a malicious web address, otherwise ending the whole process. The invention integrates malicious web site, malicious software and registry information, combines electronic forensics with the safety of virtual machine system to form a complete system, and has higher identification rate.

Description

technical field [0001] The invention relates to the field of virtual machine security protection, in particular to a virtual machine security protection method and system based on big data and machine learning. Background technique [0002] In recent years, there have been frequent major security incidents around the world. The "Prism Gate" incident and the "RSA Backdoor" incident that were exposed in 2013, and the new "worm-like" ransomware WannaCry that broke out in 2017 have aroused widespread attention on information security from all walks of life. Cyber ​​attacks have shifted from the initial spontaneous and distributed attacks to professional and organized behaviors, showing the characteristics of professional attack tools, commercial purposes, and organized behaviors. As profit becomes the core of cyber attack activities, many information network vulnerabilities and attack tools are commercialized by criminals and organizations to make huge profits, thus accelerating...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/455G06F21/56
CPCG06F9/45558G06F21/565G06F2009/45587G06F2009/45595
Inventor 代琪怡李松林李平阳谢开林章志辉廖西颜琪李茂毅蔡波
Owner 电子科技大学成都学院